An Authentication Scheme for Ubiquitous RFID Systems

被引:0
|
作者
Yeh, Kuo-Hui [1 ]
Chen, YuShan [1 ]
Wang, Fan-Wei [1 ]
机构
[1] Natl Dong Hwa Univ, Dept Informat Management, Hualien, Taiwan
关键词
Authentication; privacy; RFID; security; SUAP3; PROTOCOL; SECURITY;
D O I
10.3233/978-1-61499-462-6-41
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In order to fulfill system security and computation limitation of low-cost RF tags at the same time, the research of the lightweight RFID authentication has promptly become one of the hottest topics in recent years. Recently, Morshed et al. proposed an authentication scheme, called SUAP3, to achieve the security and efficiency under ubiquitous RFID-based systems. Later, Safkhani et al. and Wang et al. had demonstrated that SUAP3 is insecure against full-disclosure attack and tag traceability attack. However, these attacks are based on powerful assumptions, and the feasibilities of the two attacks are thus a little doubtful. In this paper, we present a real passive tag-tracking attack without any specific assumptions. An adversary can exploit a series of challenge-response procedures to derive the secrets maintained at the tag. With the cryptanalysis proposed by us, the insecurity of SUAP3 is truly proved. In addition, we present a novel and robust ubiquitous authentication scheme for RFID based application systems.
引用
收藏
页码:41 / 50
页数:10
相关论文
共 50 条
  • [1] Secure ubiquitous authentication protocols for RFID systems
    Morshed, Md Monzur
    Atkins, Anthony
    Yu, Hongnian
    [J]. EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2012,
  • [2] Secure ubiquitous authentication protocols for RFID systems
    Md Monzur Morshed
    Anthony Atkins
    Hongnian Yu
    [J]. EURASIP Journal on Wireless Communications and Networking, 2012
  • [3] A secure authentication scheme for RFID systems
    Dass, Prajnamaya
    Om, Hari
    [J]. 1ST INTERNATIONAL CONFERENCE ON INFORMATION SECURITY & PRIVACY 2015, 2016, 78 : 100 - 106
  • [4] A Server Independent Authentication Scheme for RFID Systems
    Wang, Bin
    Ma, Maode
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2012, 8 (03) : 689 - 696
  • [5] HPAP: A Novel Authentication Scheme for RFID Systems
    Hakeem, Mohammed J.
    Raahemifar, Kaamran
    Khan, Gul N.
    [J]. 2013 26TH ANNUAL IEEE CANADIAN CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING (CCECE), 2013, : 402 - 407
  • [6] Provably secure ubiquitous systems: Universally composable RFID authentication protocols
    Burmester, Mike
    van Le, Tri
    de Medeiros, Breno
    [J]. 2006 SECURECOMM AND WORKSHOPS, 2006, : 332 - +
  • [7] An Anonymous Mutual Authentication Scheme for Healthcare RFID Systems
    Moniem, Sarah A.
    Taha, Sanaa
    Hamza, Haithem S.
    [J]. 2017 IEEE SMARTWORLD, UBIQUITOUS INTELLIGENCE & COMPUTING, ADVANCED & TRUSTED COMPUTED, SCALABLE COMPUTING & COMMUNICATIONS, CLOUD & BIG DATA COMPUTING, INTERNET OF PEOPLE AND SMART CITY INNOVATION (SMARTWORLD/SCALCOM/UIC/ATC/CBDCOM/IOP/SCI), 2017,
  • [8] A study on low-cost RFID system management with mutual authentication scheme in ubiquitous
    Kang, Soo-Young
    Lee, Imi-Yeong
    [J]. MANAGING NEXT GENERATION NETWORKS AND SERVICES, PROCEEDINGS, 2007, 4773 : 492 - +
  • [9] A study on new low-cost RFID system with mutual authentication scheme in ubiquitous
    Kang, Soo-Young
    Lee, Im-Yeong
    [J]. MUE: 2008 INTERNATIONAL CONFERENCE ON MULTIMEDIA AND UBIQUITOUS ENGINEERING, PROCEEDINGS, 2008, : 527 - 530
  • [10] An efficient and reliable ultralightweight RFID authentication scheme for healthcare systems
    Kumar, Anand
    Singh, Karan
    Shariq, Mohd
    Lal, Chhagan
    Conti, Mauro
    Amin, Ruhul
    Chaudhry, Shehzad Ashraf
    [J]. COMPUTER COMMUNICATIONS, 2023, 205 : 147 - 157